Sciweavers

517 search results - page 35 / 104
» Distributed Authentication in GRID5000
Sort
View
ICIAP
2005
ACM
15 years 3 months ago
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Giorgio Giacinto, Fabio Roli, Roberto Tronci
ICDCSW
2002
IEEE
15 years 2 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
DIM
2008
ACM
14 years 11 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
INFOCOM
2010
IEEE
14 years 8 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
CHI
2008
ACM
15 years 10 months ago
WallCology: designing interaction affordances for learner engagement in authentic science inquiry
The broadening array of technologies available to support the design of classroom activity has the potential to reshape science learning in schools. This paper presents a ubiquito...
Brenda López Silva, Brian Uphoff, Darshan B...